Sfoglia per Corso  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 8 a 27 di 43
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2021 Backdoor Attacks and Defences on Neural Networks Backdoor Attacks and Defences on Neural Networks BELLUOMINI, MASSIMILIANO
Lauree magistrali 2022 BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks LOTTO, ALESSANDRO
Lauree magistrali 2022 Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes JAFFAR, MUHAMMAD ASAD JAHANGIR
Lauree magistrali 2022 Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons COSTANTINI, LORENZO
Lauree magistrali 2022 Control Flow Graph-based Path Reconstruction in Android applications Control Flow Graph-based Path Reconstruction in Android applications DORIA, SAMUELE
Lauree magistrali 2022 Design and Implementation of a Cloud Architectural System for an IoT Sensor Network Design and Implementation of a Cloud Architectural System for an IoT Sensor Network DAL GRANDE, MATTEO
Lauree magistrali 2022 Distributed Intrusion Detection System for Heterogeneous Data in Industrial Control Systems Distributed Intrusion Detection System for Heterogeneous Data in Industrial Control Systems FREDA, FRANCESCO
Lauree magistrali 2021 Divergent: niente è come sembra. Una nuova difesa contro attacchi di tipo Website fingerprinting Divergent: nothing as it seems. A novel defence against Website Fingerprinting attacks VAROTTO, FRANCESCO
Lauree magistrali 2023 Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools CIFTPINAR, NURI BERK
Lauree magistrali 2022 Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools UYSAL, MUHAMMED EMIR
Lauree magistrali 2021 Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts CATTAI, CHRISTIAN
Lauree magistrali 2021 FairDrop: a Confidential Fair Exchange Protocol for Media Workers FairDrop: a Confidential Fair Exchange Protocol for Media Workers GALVANI, EGON
Lauree magistrali 2022 Generative Fingerprint Augmentation against Membership Inference Attacks Generative Fingerprint Augmentation against Membership Inference Attacks CAVASIN, SAVERIO
Lauree magistrali 2021 IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques BARON, ALEX
Lauree magistrali 2022 Inferring personal attributes with a millimeter wave radar Inferring personal attributes with a millimeter wave radar TAMAYO GONZALEZ, CINTHYA CELINA
Lauree magistrali 2022 LLMs Evaluation for Android Vulnerability Repair LLMs Evaluation for Android Vulnerability Repair BRACONARO, ELISA
Lauree magistrali 2022 Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment RIZZO, ALESSANDRO
Lauree magistrali 2022 Penetration testing applied to 5G Core Network Penetration testing applied to 5G Core Network GIAMBARTOLOMEI, FILIPPO
Lauree magistrali 2022 Privacy and Security Analysis of mHealth Apps Privacy and Security Analysis of mHealth Apps MANCINI, ELEONORA
Lauree magistrali 2022 Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions STEFANI, CLAUDIO
Mostrati risultati da 8 a 27 di 43
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile